#VU28172 Information disclosure in Signal Private Messenger for Android and Signal Private Messenger for iOS - CVE-2020-5753
Published: May 21, 2020
Signal Private Messenger for Android
Signal Private Messenger for iOS
Signal Foundation
Description
The vulnerability allows a remote attacker to gain access to potentially sensitive information.
The vulnerability exists due to application discloses currently used DNS server to arbitrary user from non-contact list. The issue is related to how WebRTC processes ICE Candidates, which takes place before a user decides to answer an incoming Signal call. A remote attacker can gain access to victim's current DNS server IP address and based on this data uncover victim's geographical location.